SLF4J(W): Class path contains multiple SLF4J providers. SLF4J(W): Found provider [ch.qos.logback.classic.spi.LogbackServiceProvider@368d5c00] SLF4J(W): Found provider [org.slf4j.simple.SimpleServiceProvider@12a160c2] SLF4J(W): See https://www.slf4j.org/codes.html#multiple_bindings for an explanation. SLF4J(I): Actual provider is of type [ch.qos.logback.classic.spi.LogbackServiceProvider@368d5c00] 11:04:25.357 [main] INFO o.o.n.t.spi.NettyTransportSupport - Netty transport backed by java.nio 11:04:25.461 [main] INFO o.o.y.b.r.StringValueObjectFactory - Instantiated factory for class org.opendaylight.yang.gen.v1.urn.ietf.params.xml.ns.yang.ietf.inet.types.rev130715.Ipv4AddressNoZone 11:04:25.462 [main] INFO o.o.y.b.r.StringValueObjectFactory - Instantiated factory for class org.opendaylight.yang.gen.v1.urn.ietf.params.xml.ns.yang.ietf.inet.types.rev130715.Ipv4Prefix 11:04:25.464 [main] INFO o.o.y.b.r.StringValueObjectFactory - Instantiated factory for class org.opendaylight.yang.gen.v1.urn.ietf.params.xml.ns.yang.ietf.inet.types.rev130715.Ipv6AddressNoZone 11:04:25.465 [main] INFO o.o.y.b.r.StringValueObjectFactory - Instantiated factory for class org.opendaylight.yang.gen.v1.urn.ietf.params.xml.ns.yang.ietf.inet.types.rev130715.Ipv6Prefix 11:04:28.424 [main] INFO o.o.m.d.broker.DOMNotificationRouter - DOM Notification Router started 11:04:28.613 [main] INFO o.o.mdsal.dom.broker.DOMRpcRouter - DOM RPC/Action router started 11:04:29.171 [main] INFO o.o.r.s.RestconfTransportChannelListener - Initialized with service class org.opendaylight.restconf.server.mdsal.MdsalRestconfServer 11:04:29.172 [main] INFO o.o.r.s.RestconfTransportChannelListener - Initialized with base path: /rests, default encoding: JSON, default pretty print: false 11:04:29.222 [main] INFO o.o.n.c.impl.DefaultNetconfTimer - NETCONF timer started 11:04:29.381 [main] INFO o.o.n.c.m.i.DefaultSchemaResourceManager - Schema Resource Manager instantiated on /tmp/junit-13772876136405971544/schema 11:04:29.702 [main] INFO o.o.n.c.impl.DefaultNetconfTimer - NETCONF timer started 11:04:29.703 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - Starting 1, SSH simulated devices starting on port 44827 11:04:29.705 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - Loading models from classpath. 11:04:29.713 [main] INFO o.o.y.y.p.r.SharedEffectiveModelContextFactory - Using weak references 11:04:29.793 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - using MdsalOperationProvider. 11:04:30.188 [main] INFO o.o.n.s.s.c.u.s.b.BouncyCastleSecurityProviderRegistrar - getOrCreateProvider(BC) created instance of org.bouncycastle.jce.provider.BouncyCastleProvider 11:04:30.190 [main] INFO o.o.n.s.s.c.u.s.e.EdDSASecurityProviderRegistrar - getOrCreateProvider(EdDSA) created instance of org.opendaylight.netconf.shaded.eddsa.EdDSASecurityProvider 11:04:30.354 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - All simulated devices started successfully from port 44827 to 44827 11:04:30.651 [restconf-netty-e2e-2] INFO o.o.restconf.api.ApiPathParser - Consecutive slashes in REST URLs will be rejected 11:04:31.270 [/127.0.0.1:47342-http-server-req-0] INFO o.o.n.t.spi.AbstractNetconfTopology - Connecting RemoteDevice{Uri{value=device-sim}}, with config Node{nodeId=Uri{value=device-sim}, augmentation=[NetconfNodeAugment{netconfNode=NetconfNode{actorResponseWaitTime=5, backoffJitter=0.1, backoffMultiplier=1.5, concurrentRpcLimit=0, connectionTimeoutMillis=20000, credentials=***, defaultRequestTimeoutMillis=60000, host=Host{ipAddress=IpAddress{ipv4Address=Ipv4Address{value=127.0.0.1}}}, keepaliveDelay=120, lockDatastore=true, maxBackoffMillis=1800000, maxConnectionAttempts=0, minBackoffMillis=2000, port=PortNumber{value=44827}, reconnectOnChangedSchema=false, schemaCacheDirectory=schema, schemaless=false, tcpOnly=false}}]} 11:04:31.337 [/127.0.0.1:47342-http-server-req-0] INFO o.o.n.t.spi.NetconfNodeHandler - Adding keepalive facade, for device Uri{value=device-sim} 11:04:31.343 [/127.0.0.1:47342-http-server-req-0] INFO o.o.n.t.spi.NetconfNodeHandler - Concurrent rpc limit is smaller than 1, no limit will be enforced for device RemoteDeviceId[name=device-sim, address=/127.0.0.1:44827] 11:04:32.244 [netconf-netty-e2e-0] WARN o.o.n.s.s.c.k.AcceptAllServerKeyVerifier - Server at /127.0.0.1:44827 presented unverified RSA key: SHA256:F8xGYjGyS6WuJ/KN40dmRc7KDBg8Tru2a0cmnHGoKys 11:04:32.272 [netconf-device-simulator-threads-1] INFO o.o.n.t.ssh.TransportServerSession - Session device-username@/127.0.0.1:56366 authenticated 11:04:32.384 [netconf-device-simulator-threads-1] INFO o.o.m.d.s.i.InMemoryDOMDataStoreFactory - ThreadFactory created: DOM-CFG-DCL 11:04:32.400 [netconf-device-simulator-threads-1] INFO o.o.m.d.s.i.InMemoryDOMDataStoreFactory - ThreadFactory created: DOM-OPER-DCL 11:04:32.402 [netconf-device-simulator-threads-1] INFO o.o.n.t.tool.MdsalOperationProvider - ThreadFactory created: CommitFutures 11:04:32.998 [topology-schema-assembler-3] INFO o.o.n.client.mdsal.NetconfDevice - RemoteDeviceId[name=device-sim, address=/127.0.0.1:44827]: Netconf connector initialized successfully 11:04:35.358 [netconf-netty-e2e-0] INFO o.o.n.c.m.NetconfDeviceCommunicator - RemoteDeviceId[name=device-sim, address=/127.0.0.1:44827]: Session went down: End of input 11:04:35.382 [main] INFO o.o.m.d.broker.DOMNotificationRouter - DOM Notification Router started 11:04:35.382 [main] INFO o.o.mdsal.dom.broker.DOMRpcRouter - DOM RPC/Action router started 11:04:35.388 [main] INFO o.o.r.s.RestconfTransportChannelListener - Initialized with service class org.opendaylight.restconf.server.mdsal.MdsalRestconfServer 11:04:35.388 [main] INFO o.o.r.s.RestconfTransportChannelListener - Initialized with base path: /rests, default encoding: JSON, default pretty print: false 11:04:35.389 [main] INFO o.o.n.c.impl.DefaultNetconfTimer - NETCONF timer started 11:04:35.391 [main] INFO o.o.n.c.m.i.DefaultSchemaResourceManager - Schema Resource Manager instantiated on /tmp/junit-16205695357953932891/schema 11:04:35.393 [main] INFO o.o.n.c.impl.DefaultNetconfTimer - NETCONF timer started 11:04:35.394 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - Starting 1, SSH simulated devices starting on port 35415 11:04:35.395 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - Loading models from classpath. 11:04:35.425 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - using MdsalOperationProvider. 11:04:35.427 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - All simulated devices started successfully from port 35415 to 35415 11:04:35.755 [/127.0.0.1:50906-http-server-req-0] INFO o.o.n.t.spi.AbstractNetconfTopology - Connecting RemoteDevice{Uri{value=device-sim}}, with config Node{nodeId=Uri{value=device-sim}, augmentation=[NetconfNodeAugment{netconfNode=NetconfNode{actorResponseWaitTime=5, backoffJitter=0.1, backoffMultiplier=1.5, concurrentRpcLimit=0, connectionTimeoutMillis=20000, credentials=***, defaultRequestTimeoutMillis=60000, host=Host{ipAddress=IpAddress{ipv4Address=Ipv4Address{value=127.0.0.1}}}, keepaliveDelay=120, lockDatastore=true, maxBackoffMillis=1800000, maxConnectionAttempts=0, minBackoffMillis=2000, port=PortNumber{value=35415}, reconnectOnChangedSchema=false, schemaCacheDirectory=schema, schemaless=false, tcpOnly=false}}]} 11:04:35.757 [/127.0.0.1:50906-http-server-req-0] INFO o.o.n.t.spi.NetconfNodeHandler - Adding keepalive facade, for device Uri{value=device-sim} 11:04:35.757 [/127.0.0.1:50906-http-server-req-0] INFO o.o.n.t.spi.NetconfNodeHandler - Concurrent rpc limit is smaller than 1, no limit will be enforced for device RemoteDeviceId[name=device-sim, address=/127.0.0.1:35415] 11:04:35.987 [netconf-netty-e2e-2] WARN o.o.n.s.s.c.k.AcceptAllServerKeyVerifier - Server at /127.0.0.1:35415 presented unverified RSA key: SHA256:Q+vOa334sM9WxwzCtNoZz0xVgJqRT4aCunP1Zupj0uo 11:04:35.992 [netconf-device-simulator-threads-1] INFO o.o.n.t.ssh.TransportServerSession - Session device-username@/127.0.0.1:50496 authenticated 11:04:35.996 [netconf-device-simulator-threads-1] INFO o.o.m.d.s.i.InMemoryDOMDataStoreFactory - ThreadFactory created: DOM-CFG-DCL 11:04:35.996 [netconf-device-simulator-threads-1] INFO o.o.m.d.s.i.InMemoryDOMDataStoreFactory - ThreadFactory created: DOM-OPER-DCL 11:04:35.996 [netconf-device-simulator-threads-1] INFO o.o.n.t.tool.MdsalOperationProvider - ThreadFactory created: CommitFutures 11:04:36.166 [topology-schema-assembler-7] INFO o.o.n.client.mdsal.NetconfDevice - RemoteDeviceId[name=device-sim, address=/127.0.0.1:35415]: Netconf connector initialized successfully 11:04:36.965 [netconf-netty-e2e-2] INFO o.o.n.c.m.NetconfDeviceCommunicator - RemoteDeviceId[name=device-sim, address=/127.0.0.1:35415]: Session went down: End of input 11:04:36.974 [main] INFO o.o.m.d.broker.DOMNotificationRouter - DOM Notification Router started 11:04:36.974 [main] INFO o.o.mdsal.dom.broker.DOMRpcRouter - DOM RPC/Action router started 11:04:36.984 [main] INFO o.o.r.s.RestconfTransportChannelListener - Initialized with service class org.opendaylight.restconf.server.mdsal.MdsalRestconfServer 11:04:36.985 [main] INFO o.o.r.s.RestconfTransportChannelListener - Initialized with base path: /rests, default encoding: JSON, default pretty print: false 11:04:36.986 [main] INFO o.o.n.c.impl.DefaultNetconfTimer - NETCONF timer started 11:04:36.988 [main] INFO o.o.n.c.m.i.DefaultSchemaResourceManager - Schema Resource Manager instantiated on /tmp/junit-5667515788282786025/schema 11:04:36.991 [main] INFO o.o.n.c.impl.DefaultNetconfTimer - NETCONF timer started 11:04:36.992 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - Starting 1, SSH simulated devices starting on port 38765 11:04:36.994 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - Loading models from classpath. 11:04:37.042 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - using SimulatedOperationProvider. 11:04:37.046 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - All simulated devices started successfully from port 38765 to 38765 11:04:37.368 [/127.0.0.1:55328-http-server-req-0] INFO o.o.n.t.spi.AbstractNetconfTopology - Connecting RemoteDevice{Uri{value=device-sim}}, with config Node{nodeId=Uri{value=device-sim}, augmentation=[NetconfNodeAugment{netconfNode=NetconfNode{actorResponseWaitTime=5, backoffJitter=0.1, backoffMultiplier=1.5, concurrentRpcLimit=0, connectionTimeoutMillis=20000, credentials=***, defaultRequestTimeoutMillis=60000, host=Host{ipAddress=IpAddress{ipv4Address=Ipv4Address{value=127.0.0.1}}}, keepaliveDelay=120, lockDatastore=true, maxBackoffMillis=1800000, maxConnectionAttempts=0, minBackoffMillis=2000, port=PortNumber{value=38765}, reconnectOnChangedSchema=false, schemaCacheDirectory=schema, schemaless=false, tcpOnly=false}}]} 11:04:37.370 [/127.0.0.1:55328-http-server-req-0] INFO o.o.n.t.spi.NetconfNodeHandler - Adding keepalive facade, for device Uri{value=device-sim} 11:04:37.370 [/127.0.0.1:55328-http-server-req-0] INFO o.o.n.t.spi.NetconfNodeHandler - Concurrent rpc limit is smaller than 1, no limit will be enforced for device RemoteDeviceId[name=device-sim, address=/127.0.0.1:38765] 11:04:37.693 [netconf-netty-e2e-4] ERROR io.netty.util.ResourceLeakDetector - LEAK: ByteBuf.release() was not called before it's garbage-collected. See https://netty.io/wiki/reference-counted-objects.html for more information. Recent access records: Created at: io.netty.buffer.AbstractByteBufAllocator.compositeDirectBuffer(AbstractByteBufAllocator.java:224) io.netty.buffer.AbstractByteBufAllocator.compositeBuffer(AbstractByteBufAllocator.java:202) io.netty.handler.codec.MessageAggregator.decode(MessageAggregator.java:269) io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:91) io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:356) io.netty.channel.ChannelInboundHandlerAdapter.channelRead(ChannelInboundHandlerAdapter.java:93) io.netty.handler.codec.http.HttpServerKeepAliveHandler.channelRead(HttpServerKeepAliveHandler.java:64) io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:354) org.opendaylight.netconf.transport.http.HTTPScheme$CleartextUpgradeHandler.channelRead0(HTTPScheme.java:131) org.opendaylight.netconf.transport.http.HTTPScheme$CleartextUpgradeHandler.channelRead0(HTTPScheme.java:116) io.netty.channel.SimpleChannelInboundHandler.channelRead(SimpleChannelInboundHandler.java:99) io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:356) io.netty.handler.codec.http.HttpServerUpgradeHandler.decode(HttpServerUpgradeHandler.java:290) io.netty.handler.codec.http.HttpServerUpgradeHandler.decode(HttpServerUpgradeHandler.java:41) io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:91) io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:356) io.netty.channel.CombinedChannelDuplexHandler$DelegatingChannelHandlerContext.fireChannelRead(CombinedChannelDuplexHandler.java:434) io.netty.handler.codec.ByteToMessageDecoder.fireChannelRead(ByteToMessageDecoder.java:346) io.netty.handler.codec.ByteToMessageDecoder.fireChannelRead(ByteToMessageDecoder.java:333) io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:455) io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:290) io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:249) io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:354) io.netty.handler.codec.ByteToMessageDecoder.handlerRemoved(ByteToMessageDecoder.java:266) io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:537) io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:469) io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:290) io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:356) io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1429) io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:918) io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:168) io.netty.channel.nio.AbstractNioChannel$AbstractNioUnsafe.handle(AbstractNioChannel.java:445) io.netty.channel.nio.NioIoHandler$DefaultNioRegistration.handle(NioIoHandler.java:381) io.netty.channel.nio.NioIoHandler.processSelectedKey(NioIoHandler.java:587) io.netty.channel.nio.NioIoHandler.processSelectedKeysOptimized(NioIoHandler.java:562) io.netty.channel.nio.NioIoHandler.processSelectedKeys(NioIoHandler.java:503) io.netty.channel.nio.NioIoHandler.run(NioIoHandler.java:475) io.netty.channel.SingleThreadIoEventLoop.runIo(SingleThreadIoEventLoop.java:225) io.netty.channel.SingleThreadIoEventLoop.run(SingleThreadIoEventLoop.java:196) io.netty.util.concurrent.SingleThreadEventExecutor$5.run(SingleThreadEventExecutor.java:1193) io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) java.base/java.lang.Thread.run(Thread.java:1583) 11:04:37.722 [netconf-netty-e2e-4] WARN o.o.n.s.s.c.k.AcceptAllServerKeyVerifier - Server at /127.0.0.1:38765 presented unverified RSA key: SHA256:bQhFxwpHO5+tRR8yHmRQsQbBVwAO8y6BubEUMnWGkOA 11:04:37.731 [netconf-device-simulator-threads-1] INFO o.o.n.t.ssh.TransportServerSession - Session device-username@/127.0.0.1:33774 authenticated 11:04:38.042 [netconf-device-simulator-threads-1] INFO o.o.n.t.t.r.RpcHandlerDefault - getResponse: XmlElement{name='get', namespace='urn:ietf:params:xml:ns:netconf:base:1.0'} 11:04:38.149 [topology-schema-assembler-11] INFO o.o.n.client.mdsal.NetconfDevice - RemoteDeviceId[name=device-sim, address=/127.0.0.1:38765]: Netconf connector initialized successfully 11:04:39.017 [netconf-device-simulator-threads-1] INFO o.o.n.t.t.r.RpcHandlerDefault - getResponse: XmlElement{name='create-subscription', namespace='urn:ietf:params:xml:ns:netconf:notification:1.0'} 11:04:39.518 [restconf-netty-e2e-5] INFO o.o.n.t.http.ClientHttp1SseService - Client SSE enabled on channel [id: 0xa98d8ce7, L:/127.0.0.1:55386 - R:/127.0.0.1:43691] 11:04:41.137 [netconf-netty-e2e-4] INFO o.o.n.c.m.NetconfDeviceCommunicator - RemoteDeviceId[name=device-sim, address=/127.0.0.1:38765]: Session went down: End of input